Which security threat uses malicious code to destroy evidence, break systems, or encrypt data?
An administrator needs to create a new Report Template that will be used to track firewall activity. Which two (2) report template settings are optional? (Select 2)